PT-2023-8454 · Systemd+7 · Systemd-Resolved+7

Agentoak

·

Published

2022-12-08

·

Updated

2025-11-11

·

CVE-2023-7008

CVSS v3.1

5.9

Medium

AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Name of the Vulnerable Software and Affected Versions systemd-resolved (affected versions not specified)
Description The issue is related to insufficient authentication checks of messages from DNS clients in the systemd-resolved service, which manages network connections and domain name resolutions. This may allow a remote attacker to modify DNS records protected by DNSSEC by sending specially crafted DNS requests. The vulnerability can also enable man-in-the-middle attackers or the upstream DNS resolver to manipulate records of DNSSEC-signed domains, even when these records lack a signature.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Weakness Enumeration

Related Identifiers

ALSA-2024:2463
ALSA-2024:3203
ALT-PU-2024-1263
ALT-PU-2024-6023
BDU:2024-00853
CESA-2024_3203
CVE-2023-7008
DLA-3859-1
INFSA-2024_2463
INFSA-2024_3203
OESA-2024-1020
OESA-2024-2262
OPENSUSE-SU-2024:13665-1
OPENSUSE-SU-2024_3149-1
RHSA-2024:2463
RHSA-2024:3203
RHSA-2024_2463
RHSA-2024_3203
RLSA-2024:2463
SUSE-SU-2024:3149-1
SUSE-SU-2024_3149-1

Affected Products

Alt Linux
Almalinux
Centos
Red Hat
Red Os
Rocky Linux
Suse
Systemd-Resolved